System and method for effectuating computer network usage
First Claim
Patent Images
13. A system to control use of a network, comprising:
- a first processor;
a network; and
a plurality of second processors coupled to the network;
wherein the first processor is configured to;
receive from an entity identification information;
transmit the identification information to the plurality of second processors;
receive from at least some of the second processors usage information pertaining to the entity, the usage information comprising at least one condition;
aggregate the received usage information to generate a set of usage rules; and
allow the entity to use the network in accordance with the one or more usage rules.
1 Assignment
0 Petitions
Accused Products
Abstract
In one example of an embodiment of the invention, a method to control usage of resources on a network by an entity comprising a user and a host device to couple the user to the network is disclosed, comprising receiving identification information from the entity, evaluating the identity of user, and evaluating the host device. In addition, the method comprises evaluating a status of at least one additional condition related to the user and allowing the entity to use one or more network resources based, at least in part, on the evaluations. Conditions may be aggregated from a plurality of network resources. Any of these activities may be performed by plug-ins.
-
Citations
45 Claims
-
13. A system to control use of a network, comprising:
-
a first processor;
a network; and
a plurality of second processors coupled to the network;
wherein the first processor is configured to;
receive from an entity identification information;
transmit the identification information to the plurality of second processors;
receive from at least some of the second processors usage information pertaining to the entity, the usage information comprising at least one condition;
aggregate the received usage information to generate a set of usage rules; and
allow the entity to use the network in accordance with the one or more usage rules. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method to control usage of resources on a network by an entity comprising a user and a host device to couple the user to the network, the method comprising:
-
receiving identification information from the entity;
evaluating the identity of user;
evaluating the host device;
evaluating a status of at least one additional condition related to the user;
allowing the entity to use one or more network resources based, at least in part on the evaluations. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system to control usage of resources on a network by an entity comprising a user and a host device to couple the user to the network, the system comprising:
-
a processor; and
a network;
wherein the processor is configured to;
evaluate the identity of the user;
evaluate the host device;
evaluate at least one additional condition related to the user; and
allow the user to use one or more network resources based, at least in part, on the evaluations. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 39, 40, 41, 42, 43, 44, 45)
-
-
39-1. The system of claim 38, wherein the processor is configured to evaluate the host device by determining whether the host device is infected.
-
40-2. The system of claim 39, wherein the processor comprises a plug-in to determine whether the host device is infected.
Specification